sensor

Trend said attackers could remotely or locally tamper with control parameters on industrial robots, which lack security features found in modern IT systems.

Report warns of Robot Hacks, Tampering

In-brief: Common industrial robots are susceptible to hacks and other forms of electronic hacking that could cause physical harm to workers or result in flawed and dangerous products.

A researcher demonstrated a method for hacking smart television using an attack hidden in a broadcast signal. (Image courtesy of The New York Public Library.)

Researcher Says 9 in 10 Smart TVs Vulnerable to Broadcast-based Attacks

In-brief: a security researcher demonstrated a broadcast-based attacks on smart televisions, almost three years after a similar demonstration by researchers at Columbia. More than 90 percent of smart TVs may be vulnerable – but carrying out an attack may be challenging. 

Farmers in the U.S. are turning to modified firmware from third parties to "jail break" tractors and other heavy equipment: allowing the equipment owners to diagnose problems and repair equipment without approval from the manufacturer.

Hobbled by DMCA, Farmers are jail breaking Tractors | Motherboard

In-brief: Hobbled by draconian copyright restrictions from manufacturers like John Deere that make it impossible to modify or repair equipment, farmers in the U.S. have turned to unofficial software produced in countries like Ukraine to maintain their equipment. 

Reports by security researchers say that hundreds of thousands of customers of CloudPets had their information exposed online in an unsecured customer database.

Updated: The CloudPets Incident is Everything That’s Wrong with Consumer Internet of Things

In-brief: the apparent leak of data on owners of CloudPets connected stuffed animals underscores lax security and privacy practices that are common among connected products firms. (Updated with comment from Troy Hunt. PFR 2/28/2017.)

Webinar: Deconstructing the Top IoT Attacks of 2016

Webinar: Deconstructing the Top IoT Attacks of 2016

In-brief: a recording and slides from the Security Ledger and Bastille’s recent webinar “Deconstructing the Top IoT Hacks of 2016” are now available online.